background image

Summary of Contents for xStack DGS-3620-52P

Page 1: ......

Page 2: ...f D Link Corporation is strictly forbidden Trademarks used in this text D Link and the D LINK logo are trademarks of D Link Corporation Microsoft and Windows are registered trademarks of Microsoft Cor...

Page 3: ...System Information Settings 9 Port Configuration 9 Port Settings 9 Port Description Settings 11 Port Error Disabled 12 Port Auto Negotiation Information 13 Jumbo Frame Settings 14 PoE 14 PoE System S...

Page 4: ...Traps Settings 51 SNMP Linkchange Traps Settings 51 SNMP View Table Settings 52 SNMP Community Table Settings 53 SNMP Group Table Settings 54 SNMP Engine ID Settings 55 SNMP User Table Settings 55 SNM...

Page 5: ...g 112 Multicast VLAN 119 Multicast Filtering 125 IPv4 Multicast Filtering 125 IPv6 Multicast Filtering 127 Multicast Filtering Mode 130 ERPS Settings 130 LLDP 134 LLDP 134 LLDP MED 142 NLB FDB Setting...

Page 6: ...231 BGP Global Settings 232 BGP Aggregate Address Settings 233 BGP Network Settings 234 BGP Dampening Settings 235 BGP Peer Group Settings 236 BGP Neighbor 237 BGP Reflector Settings 245 BGP Confeder...

Page 7: ...file 298 Adding a CPU Packet Content ACL Profile 301 ACL Finder 304 ACL Flow Meter 304 Egress Access Profile List 307 Adding an Ethernet ACL Profile 308 Adding an IPv4 Egress ACL Profile 311 Adding an...

Page 8: ...ngs 360 Port Security Entries 361 ARP Spoofing Prevention Settings 361 BPDU Attack Protection 362 Loopback Detection Settings 364 Traffic Segmentation Settings 365 NetBIOS Filtering Settings 366 DHCP...

Page 9: ...CFM Port Settings 415 CFM MIPCCM Table 416 CFM Loopback Settings 416 CFM Linktrace Settings 417 CFM Packet Counter 418 CFM Fault Table 418 CFM MP Table 419 Ethernet OAM 419 Ethernet OAM Settings 419...

Page 10: ...irmware 449 Upload Firmware to TFTP 449 Upload Firmware to RCP 450 Upload Firmware to HTTP 451 Download Configuration 451 Download Configuration from TFTP 451 Download Configuration from RCP 452 Downl...

Page 11: ...mail Bold font is also used to represent filenames program names and commands For example use the copy command Boldface Typewriter Font Indicates commands and responses to prompts that must be typed e...

Page 12: ...tch the power available at the Switch s location o 115 volts V 60 hertz Hz in most of North and South America and some Far Eastern countries such as South Korea and Taiwan o 100 V 50 Hz in eastern Jap...

Page 13: ...and that the full weight of the rack rests on the floor Install front and side stabilizers on a single rack or front stabilizers for joined multiple racks before working on the rack Always load the r...

Page 14: ...assis The following steps can also be taken prevent damage from electrostatic discharge ESD 1 When unpacking a static sensitive component from its shipping carton do not remove the component from the...

Page 15: ...to access the same internal switching software and configure it Thus all settings encountered in web based management are the same as those found in the console program Login to the Web Manager To beg...

Page 16: ...he table Figure 1 2 Main Web Manager page Area Number Function Area 1 Select the menu or window to display Open folders and click the hyperlinked menu buttons and subfolders contained within them to d...

Page 17: ...ing the Layer 2 functionality of the Switch L3 Features In this section the user will be able to configure features regarding the Layer 3 functionality of the Switch QoS In this section the user will...

Page 18: ...witch To return to the Device Information window after viewing other windows click the DGS 3620 Series link The Device Information window shows the Switch s MAC Address assigned by the factory and unc...

Page 19: ...ow Figure 2 2 System Information Settings window The fields that can be configured are described below Parameter Description System Name Enter a system name for the Switch if so desired This name will...

Page 20: ...devices in full or half duplex except 1000 Mbps which is always full duplex The Auto setting allows the port to automatically determine the fastest settings the device the port is connected to can ha...

Page 21: ...MDI mode on another switch through a cross over cable Cross Select cross for cross cabling If set to cross state the port is in MDIX mode and can be connected to a port in MDI mode on another switch t...

Page 22: ...configuring the Combo ports the Medium Type defines the type of transport medium to be used whether Copper or Fiber Description Users may then enter a description for the chosen port s Click the Appl...

Page 23: ...d or disabled Reason Describe the reason why the port has been error disabled such as it has become a shutdown port for storm control Port Auto Negotiation Information The following window displays th...

Page 24: ...ult is Disabled When disabled the maximum frame size is 1536 bytes When enabled the maximum frame size is 13312 bytes Unit Select the unit you wish to configure From Port To Port Select the appropriat...

Page 25: ...below Figure 2 8 PoE System Settings window The following parameters can be configured Parameter Description Unit Select the unit you wish to configure Tick the All check box to select all units Power...

Page 26: ...le ports happen to have the same level of priority the port ID will be used to determine the priority The lower port ID has higher priority The setting of priority will affect the order of supplying p...

Page 27: ...fined Choose from the following options 2 5 10 15 minutes or Never The default setting is 10 minutes Data Bits Display the data bits used for the serial port connection Parity Bits Display the parity...

Page 28: ...anges made Save Mode Use the drop down menu to choose the method for saving the switch log to the flash memory The user has three options On Demand Users who choose this method will only save log file...

Page 29: ...slog server Facility Use the drop down menu to select Local 0 Local 1 Local 2 Local 3 Local 4 Local 5 Local 6 or Local 7 UDP Port 514 or 6000 65535 Type the UDP port number used for sending Syslog mes...

Page 30: ...time in days hours minutes and seconds since the Switch was last restarted Level Display the level of the log entry Log Text Display text describing the event that triggered the history log entry Cli...

Page 31: ...to an SNMP agent and the Switch s log for analysis Severity Level This drop down menu allows you to select the level of messages that will be sent The options are Emergency 0 Alert 1 Critical 2 Error...

Page 32: ...ayed in the Time Range Information table in the bottom half of the window shown above Port Group Settings This window is used to create port groups and add or delete ports from the port groups To view...

Page 33: ...Admin Operator Power User User Configuration Read Write Read Write partly Read Write partly No Network Monitoring Read Write Read Write Read only Read only Community Strings and Trap Stations Read Wr...

Page 34: ...ill not be logged When the user uses AAA authentication to logged in the user name should not be changed if the user has used the Enable Admin function to replace its privilege Stacking From firmware...

Page 35: ...through an election process which determines the second lowest MAC address and then will assign that switch as the Backup Master if all priorities are the same The Backup master are physically display...

Page 36: ...cleared as well If the Backup Master has been hot removed a new Backup Master will be chosen through the election process previously described Switches in the stack will clear the configurations of t...

Page 37: ...ill become zero after the stacking has stabilized Current Box ID The Box ID of the switch in the stack to be configured New Box ID The new box ID of the selected switch in the stack that was selected...

Page 38: ...is entered and is used to translate IP addresses to MAC addresses To view the following window click Management ARP Static ARP Settings as show below Figure 3 1 Static ARP Settings window The fields...

Page 39: ...the source IP and destination IP are in the same interface To view the following window click Management ARP Proxy ARP Settings as show below Figure 3 2 Proxy ARP Settings window Click the Edit butto...

Page 40: ...ived an ARP request packet that is sent by an IP address that match the system s own IP address In this case the system knows that somebody out there uses an IP address that is conflict with the syste...

Page 41: ...equest will not be sent periodically By default the interval time is 0 Click the Apply button located in the Gratuitous ARP Trap Log section to accept the changes made in this section Click the Apply...

Page 42: ...eb manager will display the Switch s current IP settings NOTE The Switch s factory default IP address is 10 90 90 90 with a subnet mask of 255 0 0 0 and a default gateway of 0 0 0 0 To view the follow...

Page 43: ...etwork 255 255 0 0 for a Class B network and 255 255 255 0 for a Class C network but custom subnet masks are allowed Gateway IP address that determines where packets with a destination address outside...

Page 44: ...n menu to enable or disable the Interface Admin State Secondary Interface Tick the check box to use this Interface as a Secondary Interface Click the Apply button to accept the changes made Click the...

Page 45: ...IPv6 interface name IPv6 State Use the drop down menu to enable or disable IPv6 State Interface Admin State Use the drop down menu to enable or disable the Interface Admin State IPv6 Network Address...

Page 46: ...ending unsolicited multicast Router Advertisements from the interface in seconds It must be no less than 3 seconds and no greater than 75 MaxRtrAdvInterval The default is 0 33 MaxRtrAdvInterval Max Ro...

Page 47: ...its name can t be a duplicate with the regular ipif IPv4 Address Enter a 32 bit IPv4 address for the loopback interface Subnet Mask Enter a subnet mask to be applied to the loopback interface Interfa...

Page 48: ...he console CLI Paging is Enabled by default To disable it click the Disabled radio button DHCP Auto Configuration State Enable or disable the Switch s DHCP auto configuration feature When enabled the...

Page 49: ...n to accept the changes made Session Table Users can display the management sessions since the Switch was last rebooted To view the following window click Management Session Table as show below Figure...

Page 50: ...through its management VLAN 2 Member Switch MS This is a switch that has joined a single IP group and is accessible from the CS and it takes on the following characteristics a It is not a CS or MS of...

Page 51: ...tomatically No configuration will be necessary to rediscover these switches There are some instances where pre saved MS switches cannot be rediscovered For example if the Switch is still powered down...

Page 52: ...val 30 90 The user may set the discovery protocol interval in seconds that the Switch will send out discovery packets Returning information to a Commander Switch will include information about other s...

Page 53: ...l Port Displays the number of the physical port on the CS that the MS or CaS is connected to The CS will have no entry in this field Speed Displays the connection speed between the CS and the MS or Ca...

Page 54: ...ch Layer 2 commander switch Member switch of other group Layer 3 commander switch Layer 2 candidate switch Commander switch of other group Layer 3 candidate switch Layer 2 member switch Unknown device...

Page 55: ...the mouse cursor over a line between two devices will display the connection speed between the two devices as shown below Figure 3 23 Port Speed Utilizing the Tool Tip Right clicking on a device will...

Page 56: ...d with the last six digits of the MAC Address to identify it Module Name Displays the full module name of the switch that was right clicked MAC Address Displays the MAC Address of the corresponding Sw...

Page 57: ...e 3 28 Right clicking a Candidate icon The following options may appear for the user to configure Collapse To collapse the group that will be represented by a single icon Expand To expand the SIM grou...

Page 58: ...the views with the latest status View Topology Display the Topology view About Will display the SIM information including the current SIM version Help Figure 3 32 About window Firmware Upgrade This s...

Page 59: ...Management Protocol SNMP is an OSI Layer 7 Application Layer designed specifically for managing and monitoring network devices SNMP enables network management stations to read and modify the settings...

Page 60: ...rap recipient or network manager Typical traps include trap messages for Authentication Failure Topology Change and Broadcast Multicast Storm Traps The Switch in the Management Information Base MIB st...

Page 61: ...ields that can be configured are described below Parameter Description SNMP Traps Enable this option to use the SNMP Traps feature SNMP Authentication Trap Enable this option to use the SNMP Authentic...

Page 62: ...orts to use State Use the drop down menu to enable or disable the SNMP link change Trap Click the Apply button to accept the changes made SNMP View Table Settings Users can assign views to community s...

Page 63: ...accept the changes made Click the Delete button to remove the specific entry SNMP Community Table Settings Users can create an SNMP community string to define the relationship between the SNMP manage...

Page 64: ...SNMP Group created with this table maps SNMP users identified in the SNMP User Table to the views created in the previous window To view the following window click Management SNMP Settings SNMP Group...

Page 65: ...on the Switch To view the following window click Management SNMP Settings SNMP Engine ID Settings as show below Figure 3 42 SNMP Engine ID Settings window The fields that can be configured are describ...

Page 66: ...Encryption field has been checked This field will require the user to enter a password SHA Specify that the HMAC SHA authentication protocol will be used This field is only operable when V3 is selecte...

Page 67: ...button to accept the changes made Click the Delete button to remove the specific entry SNMPv6 Host Table Settings Users can set up SNMP trap recipients for IPv6 To view the following window click Man...

Page 68: ...rm Trap Feature Click the Apply button to accept the changes made SNMP Community Encryption Settings This window is used to enable or disable the encryption state on the SNMP community string To view...

Page 69: ...r confirmation Click the Apply button to accept the changes made Telnet Settings Users can configure Telnet Settings on the Switch To view the following window click Management Telnet Settings as show...

Page 70: ...Web Status Web based management is Enabled by default If you choose to disable this by clicking Disabled you will lose the ability to configure the system through the web interface as soon as these s...

Page 71: ...sitive to even slight delays or for data from specified end users whose data transmissions warrant special consideration The Switch allows you to further tailor how priority tagged data packets are ha...

Page 72: ...gging The act of putting 802 1Q VLAN information into the header of a packet Untagging The act of stripping 802 1Q VLAN information out of the packet header Ingress port A port on a switch where packe...

Page 73: ...r presence is indicated by a value of 0x8100 in the EtherType field When a packet s EtherType field is equal to 0x8100 the packet carries the IEEE 802 1Q 802 1p tag The tag is contained in the followi...

Page 74: ...ned on the Switch all ports are then assigned to a default VLAN with a PVID equal to 1 Untagged packets are assigned the PVID of the port on which they were received Forwarding decisions are based upo...

Page 75: ...tination port transmits it to its attached network segment If the packet is not tagged with VLAN information the ingress port will tag the packet with its own PVID as a VID The switch then determines...

Page 76: ...AN 2 packets If Port 10 is not a member of VLAN 2 then the packet will be dropped by the Switch and will not reach its destination If Port 10 is a member of VLAN 2 the packet will go through This sele...

Page 77: ...join the existing VLAN Port Display all ports of the Switch for the configuration option Tagged Specify the port as 802 1Q tagging Clicking the radio button will designate the port as tagged Click the...

Page 78: ...figured are described below Parameter Description VID List Enter a VLAN ID List that can be added deleted or configured Advertisement Enabling this function will allow the Switch to send out GVRP pack...

Page 79: ...up Name This is used to identify the new Protocol VLAN group Type an alphanumeric string of up to 32 characters Protocol This function maps packets to protocol defined VLANs by examining the type octe...

Page 80: ...forwarded to Once this field is specified packets accepted by the Switch that match this priority are forwarded to the CoS queue specified previously by the user Click the corresponding box if you wa...

Page 81: ...symmetric VLANs are needed An example of when this type of configuration might be required would be if the client was on a distinct IP subnet or if there was some confidentiality related need to segre...

Page 82: ...802 1ad service provider GVRP address or a user defined multicast address The range of the user defined address is 0180C2000000 0180C2FFFFFF Click the Apply button to accept the changes made for each...

Page 83: ...sers can create new MAC based VLAN entries search and delete existing entries When a static MAC based VLAN entry is created for a user the traffic from this user will be able to be serviced under the...

Page 84: ...mber of the secondary VLAN A secondary VLAN cannot be specified with advertisement Only the primary VLAN can be configured as a layer 3 interface The private VLAN member port cannot be configured with...

Page 85: ...ow click L2 Features VLAN PVID Auto Assign Settings as show below Figure 4 16 PVID Auto Assign Settings window Click the Apply button to accept the changes made Subnet VLAN Subnet VLAN Settings A subn...

Page 86: ...n entered Click the Delete button to remove the specific entry based on the information entered Click the Show All button to display all the existing entries Click the Delete All button to remove all...

Page 87: ...er VLAN it cannot bind to other VLANs A super VLAN cannot be a sub VLAN of other super VLANs Super VLAN Settings This window is used to configure a super VLAN To view the following window click L2 Fea...

Page 88: ...cannot bind an IP interface to it The maximum number of sub VLANs for a super VLAN is 80 To view the following window click L2 Features VLAN Super VLAN Sub VLAN Settings as shown below Figure 4 21 Su...

Page 89: ...l be deteriorated if the data is unevenly sent the quality of service QoS for voice traffic shall be configured to ensure the transmission priority of voice packet is higher than normal traffic The sw...

Page 90: ...voice traffic resumes during the aging time the aging timer will be reset and stop Log State Used to enable disable sending of issue of voice VLAN log Click the Apply button to accept the changes mad...

Page 91: ...ss mask Description The description for the user defined OUI Click the Apply button to accept the changes made Click the Delete All button to remove all the user defined entries listed Click the Edit...

Page 92: ...VLAN Trunk enabled on a port s in each intermediary switch you only need to create VLAN groups in the end devices A and B C D and E automatically allow frames with VLAN group tags 1 and 2 VLAN groups...

Page 93: ...tton to navigate to a specific page when multiple pages exist NOTE The abbreviations used on this page are Tagged Port T Untagged Port U and Forbidden Port F Show VLAN Ports Users can display the VLAN...

Page 94: ...et This identifies the packet as double tagged and segregates it from other VLANs on the network therefore creating a hierarchy of VLANs within a single packet Here is an example Q in Q VLAN tagged pa...

Page 95: ...ccess Control lists are cleared and must be reconfigured 6 When Q in Q VLANs are enabled GVRP can work with Q in Q VLANs 7 The tags of all packets sent from the CPU to the UNI ports must be striped or...

Page 96: ...translated to SP VLAN tagged packets by adding or replacing according the configured rule On egress at this port the SP VLAN tag will be recovered to C VLAN tag or be striped The priority will be the...

Page 97: ...on Spanning Tree This Switch supports three versions of the Spanning Tree Protocol 802 1D 1998 STP 802 1D 2004 Rapid STP and 802 1Q 2005 MSTP 802 1D 1998 STP will be familiar to most networking profes...

Page 98: ...lementing IEEE 802 1D 1998 however the advantages of using RSTP will be lost The IEEE 802 1D 2004 Rapid Spanning Tree Protocol RSTP evolved from the 802 1D 1998 STP standard RSTP was developed in orde...

Page 99: ...n P2P ports may be used to connect to other bridges Under RSTP MSTP all ports operating in full duplex mode are considered to be P2P ports unless manually overridden through configuration P2P Port MST...

Page 100: ...r port basis The default is 2 seconds Bridge Forward Delay 4 30 The Forward Delay can be from 4 to 30 seconds Any port on the Switch spends this time in the listening state while moving from the block...

Page 101: ...hey are restricted in that a P2P port must operate in full duplex Like edge ports P2P ports transition to a forwarding state rapidly thus benefiting from RSTP A P2P value of False indicates that the p...

Page 102: ...ndow click L2 Features Spanning Tree MST Configuration Identification as show below Figure 4 38 MST Configuration Identification window The fields that can be configured are described below Parameter...

Page 103: ...Port Information This window displays the current MSTI configuration information and can be used to update the port configuration for an MSTI ID If a loop occurs the MSTP function will use the port pr...

Page 104: ...automatically and optimally for an interface Priority Enter a value between 0 and 240 to set the priority for the port interface A higher priority will designate the interface to forward packets first...

Page 105: ...automatically applied to the ports in the aggregated group and a link failure within the group causes the network traffic to be directed to the remaining links in the group The Spanning Tree Protocol...

Page 106: ...ned to a group Active Ports Shows the ports that are currently forwarding packets Click the Apply button to accept the changes made Click the Clear All button to clear out all the information entered...

Page 107: ...w is used to configure the static unicast forwarding on the Switch To view the following window click L2 Features FDB Static FDB Settings Unicast Static FDB Settings as show below Figure 4 44 Unicast...

Page 108: ...ort Allows the selection of ports that will be members of the static multicast group and ports that are either forbidden from joining dynamically or that can join the multicast group dynamically using...

Page 109: ...500 The maximum number of entries listed in the history log used for notification Up to 500 entries can be specified From Port To Port Select the starting and ending ports for MAC notification State...

Page 110: ...ackets through the Switch To view the following window click L2 Features FDB MAC Address Table as show below Figure 4 48 MAC Address Table window The fields that can be configured are described below...

Page 111: ...a specific entry based on the MAC address entered Click the Find by IP Address button to locate a specific entry based on the IP address entered Click the View All Entries button to display all the e...

Page 112: ...10 seconds If set to 0 it means to send only one report packet Static Router Port Select the port that will be included in this configuration Click the Apply button to accept the changes made for eac...

Page 113: ...recognize IGMP queries and reports sent between network stations or devices and an IGMP host When enabled for IGMP snooping the Switch can open or close a port to a specific device based on IGMP mess...

Page 114: ...tween general query transmissions The default setting is 125 seconds Max Response Time 1 25 Specify the maximum time in seconds to wait for reports from members The default setting is 10 seconds Robus...

Page 115: ...y Router Port link the following page will appear Figure 4 56 IGMP Snooping Router Port Settings window The fields that can be configured are described below Parameter Description Unit Select the unit...

Page 116: ...e the specific entry Enter a page number and click the Go button to navigate to a specific page when multiple pages exist IGMP Snooping Static Group Settings Users can view the Switch s IGMP Snooping...

Page 117: ...ck the Select All button to select all the ports for configuration Click the Clear All button to unselect all the ports for configuration Click the Apply button to accept the changes made Click the Ba...

Page 118: ...he VLAN ID list of the multicast group Port List Specify the port number s used to find a multicast group Group IPv4 Address Enter the IPv4 multicast address Click the Find button to locate a specific...

Page 119: ...ing window click L2 Features L2 Multicast Control IGMP Snooping IGMP Snooping Counter as show below Figure 4 63 IGMP Snooping Counter window The fields that can be configured are described below Param...

Page 120: ...fields Click the Refresh button to refresh the display table so that new information will appear Click the Back button to return to the previous page MLD Proxy MLD Proxy Settings This window is used...

Page 121: ...es made for each individual section Click the Select All button to select all the ports for configuration Click the Clear All button to unselect all the ports for configuration MLD Proxy Downstream Se...

Page 122: ...ader this message is sent by the router to ask if any link is requesting multicast data There are two types of MLD query messages emitted by the router The General Query is used to advertise all multi...

Page 123: ...Response Time 1 25 The maximum time in seconds to wait for reports from listeners The default setting is 10 seconds Robustness Value 1 7 Provides fine tuning to allow for expected packet loss on a su...

Page 124: ...Figure 4 71 MLD Snooping Router Port Settings window The fields that can be configured are described below Parameter Description Static Router Port This section is used to designate a range of ports...

Page 125: ...ific entry based on the information entered Click the Edit button to re configure the specific entry Enter a page number and click the Go button to navigate to a specific page when multiple pages exis...

Page 126: ...which of the Switch s ports are currently configured as router ports in IPv6 A router port configured by a user using the console or Web based management interfaces is displayed as a static router po...

Page 127: ...warding Table This page displays the switch s current MLD snooping forwarding table It provides an easy way for user to check the list of ports that the multicast group comes from and specific sources...

Page 128: ...to be displayed VID List Specify a list of VLANs to be displayed Port List Specify a list of ports to be displayed Click the Find button to locate a specific entry based on the information entered Cli...

Page 129: ...ific Multicast VLAN 3 The Multicast VLAN is exclusive with normal 802 1q VLANs which means that VLAN IDs VIDs and VLAN Names of 802 1q VLANs and Multicast VLANs cannot be the same Once a VID or VLAN N...

Page 130: ...he corresponding entry IGMP Snooping Multicast VLAN Settings On this page the user can configure the IGMP snooping multicast VLAN parameters To view the following window click L2 Features L2 Multicast...

Page 131: ...e source IP address in the join packet needs to be replaced by this IP address If none is specified the source IP address will use zero IP address Remap Priority 0 7 The remap priority value 0 to 7 to...

Page 132: ...st VLAN Settings MLD Multicast Group Profile Settings Users can add delete or configure the MLD multicast group profile on this page To view the following window click L2 Features L2 Multicast Control...

Page 133: ...tings as show below Figure 4 87 MLD Snooping Multicast VLAN Settings window The fields that can be configured are described below Parameter Description MLD Multicast VLAN State Click the radio buttons...

Page 134: ...alue 0 to 7 to be associated with the data traffic to be forwarded on the multicast VLAN None If None is specified the packet s original priority is used The default setting is None Replace Priority T...

Page 135: ...ved on specified ports on the Switch This function will therefore limit the number of reports received and the number of multicast groups configured on the Switch The user may set an IPv4 Multicast ad...

Page 136: ...s made and return to the previous page Click the Edit button to re configure the specific entry Click the Delete button to remove the specific entry IPv4 Limited Multicast Range Settings Users can con...

Page 137: ...nfiguration here Max Group 1 1024 If the checkbox Infinite is not selected the user can enter a Max Group value Infinite Tick the check box to enable or disable the use of the Infinite value Action Us...

Page 138: ...specific entry Click the Delete button to remove the specific entry After clicking the Group List link the following page will appear Figure 4 95 Multicast Address Group List Settings window The field...

Page 139: ...lick the Find button to locate a specific entry based on the information entered Enter a page number and click the Go button to navigate to a specific page when multiple pages exist IPv6 Max Multicast...

Page 140: ...icast packets whose destination is an unregistered multicast group will be forwarded within the range of ports specified above Filter Unregistered Groups The multicast packets whose destination is a r...

Page 141: ...not be enabled before the R APS VLAN is created and ring ports RPL port RPL owner are configured To view the following window click L2 Features ERPS Settings as show below Figure 4 99 ERPS Settings Wi...

Page 142: ...or displayed are described below Parameter Description R APS VLAN Display the R APS VLAN ID Ring Status Tick the check box and use the drop down menu to enable or disable the specified ring Admin Wes...

Page 143: ...ction The default hold off time is 0 milliseconds Guard Time 10 2000 Tick the check box and enter the guard time of the R APS function The default guard time is 500 milliseconds WTR Time 5 12 Tick the...

Page 144: ...r 2 10 This function calculates the Time to Live for creating and transmitting the LLDP advertisements to LLDP neighbors by changing the multiplier used by an LLDP Switch When the Time to Live for an...

Page 145: ...trap however it cannot implement traps on SNMP when the notification is disabled Admin Status This function controls the local LLDP agent and allows it to send and receive LLDP frames on the ports Thi...

Page 146: ...button to locate a specific entry based on the information entered LLDP Basic TLVs Settings TLV stands for Type length value which allows the specific sending information as a TLV element within LLDP...

Page 147: ...stem Name option System Description Use the drop down menu to enable or disable the System Description option System Capabilities Use the drop down menu to enable or disable the System Capabilities op...

Page 148: ...the space provided Dot1 TLV VLAN Use the drop down menu to enable or disable and configure the Dot1 TLV VLAN option After enabling this option the user can select to use either VLAN Name VLAN ID or A...

Page 149: ...t state is Disabled Link Aggregation The Link Aggregation option indicates that LLDP agents should transmit Link Aggregation TLV This indicates the current link aggregation status of IEEE 802 3 MACs M...

Page 150: ...atistics System window Select a Port number from the drop down menu and click the Find button to view statistics for a certain port LLDP Local Port Information The LLDP Local Port Information page dis...

Page 151: ...LDP Local Port Information Show Detail window Click the Back button to return to the previous page LLDP Remote Port Information This page displays port information learned from the neighbors The switc...

Page 152: ...d below Parameter Description LLDP MED Log State Click the radio buttons to enable or disable the log state of LLDP MED events Fast Start Repeat Count 1 10 Enter a value between 1 and 10 for the fast...

Page 153: ...tate Use the drop down menu to enable or disable transmit LLDP MED TLVs and tick the check boxes of the TLV types that the LLDP agent should transmit TLV types are Capabilities Network Policy Power Ps...

Page 154: ...the Show Normal button Figure 4 116 LLDP MED Remote Port Information Show Normal window Click the Back button to return to the previous page NLB FDB Settings The Switch supports Network Load Balancin...

Page 155: ...osecond via Ethernet networks for the very first time PTP is a technology that enables precise synchronization of clocks in systems PTP is applicable to systems communicating by local area networks su...

Page 156: ...that will be used for the communication path The default option is UDP PTP Clock Domain Number 0 127 Enter the domain attribute of the local clock All PTP messages data sets state machines and all ot...

Page 157: ...o execute To view this window click L2 Features PTP PTP Boundary Clock Settings as shown below Figure 4 120 PTP Boundary Clock Settings window The fields that can be configured are described below Par...

Page 158: ...button and enter the mean time interval between successive announce messages Referred to as the announce interval In line with the IEEE1588 protocol the value of the announce interval is represented...

Page 159: ...2 Enter the mean time interval between successive Sync messages Referred to as syncInterval Tick the Half Second check box to have the 0 5 second of syncInterval Click the Apply button to accept the...

Page 160: ...as shown below Figure 4 123 PTP Clock Information window PTP Port Information This window is used to display the active attributes of the special PTP ports on the switch To view this window click L2...

Page 161: ...xStack DGS 3620 Series Layer 3 Managed Stackable Gigabit Switch Web UI Reference Guide 151 Figure 4 125 PTP Foreign Master Records Port Information window...

Page 162: ...tic route entries for IPv4 For IPv4 static routes once a static route has been set the Switch will send an ARP request packet to the next hop router that has been set by the user Once an ARP response...

Page 163: ...ss Metric 1 65535 Represents the metric value of the IP interface entered into the table This field may read a number between 1 and 65535 Backup State Each IP address can only have one primary route w...

Page 164: ...Pv6 Static Default Route Settings as show below Figure 5 3 IPv6 Static Default Route Settings window The fields that can be configured are described below Parameter Description IPv6 Address Prefix Len...

Page 165: ...check box to display the route entries which have been written into hardware table Click the Find button to locate a specific entry based on the information entered Enter a page number and click the...

Page 166: ...changes made IP Forwarding Table The IP forwarding table stores all the direct connected IP information On this page the user can view all the direct connected IP information To view the following win...

Page 167: ...nterface Table as shown below Figure 5 9 IP Multicast Interface Table window Enter an Interface Name select a Protocol and click Find to search for the information Click the View All button to display...

Page 168: ...nterface Click the Add button to add a new entry based on the information entered Click the Find button to locate a specific entry based on the information entered Click the View All button to display...

Page 169: ...check box so that the ECMP algorithm will include the upper 5 bits of the CRC This attribution is mutually exclusive with Source IP and CRC Low If it is set Source IP and CRC Low will be excluded TCP...

Page 170: ...ecific routes Click the Apply button to accept the changes made for each individual section Click the Edit button to re configure the specific entry Click the Delete button to remove the specific entr...

Page 171: ...gured in another mode before the tunnel s information will still exist in the database However whether the tunnel s former information is valid or not it depends on the current mode GRE tunnels are si...

Page 172: ...must be consistent otherwise the GRE tunnel will not work Source IPv6 Address Click the radio button and enter the source IPv6 address of the GRE tunnel interface It is used as the source address for...

Page 173: ...ecially formatted packet that contains information about all the link states on the router 2 This link state advertisement is flooded to all routers in the area Each router that receives the link stat...

Page 174: ...etwork is calculated Shortest Path Tree Figure 5 18 Constructing a Shortest Path Tree Figure 5 19 Constructing a Shortest Path Tree The diagram above shows the network from the viewpoint of Router A R...

Page 175: ...link state updates are located This helps ensure that routing updates are not flooded throughout the entire network and will reduce the amount of bandwidth consumed by updating the various router s r...

Page 176: ...stributing these updates OSPF packets can be authenticated as coming from trusted routers by the use of predefined passwords The default for routers is to use no authentication OSPF Authentication The...

Page 177: ...the configuration of a password for a specific area Two routers on the same segment and belonging to the same area must also have the same OSPF password before they can become neighbors 3 Hello and D...

Page 178: ...ll describe their entire link state database by sending database description packets Loading The routers are finalizing the information exchange Routers have link state request list and a link state r...

Page 179: ...ksum that includes all of the packet s contents except for the 64 bit authentication field Authentication Type The type of authentication to be used for the packet Authentication A 64 bit field used b...

Page 180: ...ter The identity of the DR for this network in the view of the advertising router The DR is identified here by its IP interface address on the network Backup Designated Router The identity of the Back...

Page 181: ...be unique The DD sequence number then increments until the complete database description has been sent The rest of the packet consists of a list of the topological database s pieces Each link state ad...

Page 182: ...ance Link State Update packets are OSPF packet type 4 These packets implement the flooding of link state advertisements Each Link State Update packet carries a collection of link state advertisements...

Page 183: ...ype 5 To make the folding of link state advertisements reliable flooded advertisements are explicitly acknowledged This acknowledgment is accomplished through the sending and receiving of Link State A...

Page 184: ...es of link state advertisements may also be originated The flooding algorithm is reliable ensuring that all routers have the same collection of link state advertisements The collection of advertisemen...

Page 185: ...ent s Link State Type Advertising Router The Router ID of the router that originated the Link State Advertisement For example in network links advertisements this field is set to the Router ID of the...

Page 186: ...When set the router is an endpoint of an active virtual link that is using the described area as a Transit area V is for Virtual link endpoint E bit When set the router is an Autonomous System AS boun...

Page 187: ...counting the required metric for TOS 0 If no additional TOS metrics are given this field should be set to 0 TOS 0 Metric The cost of using this router link for TOS 0 For each link separate metrics may...

Page 188: ...ments are originated by Area Border routers A separate summary link advertisement is made for each destination known to the router that belongs to the Autonomous System AS yet is outside the area Summ...

Page 189: ...he value 0xff000000 ToS The Type of Service that the following cost is relevant to Metric The cost of this route Expressed in the same units as the interface costs in the router links advertisements A...

Page 190: ...l itself The NSSA or Not So Stubby Area is a feature that has been added to OSPF so external routes from ASs Autonomous Systems can be imported into the OSPF area As an extension of stub areas the NSS...

Page 191: ...ans the metric is considered larger than any link state path If the E bit is zero the specified metric is a Type 1 external metric This means that is comparable directly to the link state metric Forwa...

Page 192: ...translation or an aggregation of other type 7 LSAs The forwarding addresses contained in translated type 5 LSAs must be set with the exception of an LSA address range match OSPFv2 OSPF Global Settings...

Page 193: ...slate Use the drop down menu to enable or disable the translating of Type 7 LSAs into Type 5 LSAs so that they can be distributed outside of the NSSA The default is Disabled This field can only be con...

Page 194: ...re 5 38 OSPF Interface Settings Edit window The fields that can be configured are described below Parameter Description Priority 0 255 Enter the priority for the Designated Router election If a Router...

Page 195: ...al Link Settings window The fields that can be configured are described below Parameter Description Transit Area ID A 32 bit number in the form of an IP address xxx xxx xxx xxx that uniquely identifie...

Page 196: ...uter down The Dead Interval must be evenly divisible by the Hello Interval Authentication Select the authentication used Options to choose from are None Simple and MD5 When choosing Simple authenticat...

Page 197: ...This window is used to configure OSPF host route settings To view the following window click L3 Features OSPF OSPFv2 OSPF Host Router Settings as shown below Figure 5 42 OSPF Host Router Settings wind...

Page 198: ...OSPF LSDB details of the specific entry After clicking the View Detail link the following window will appear Figure 5 44 OSPF LSDB Table View Detail window Click the Back button to return to the prev...

Page 199: ...following window click L3 Features OSPF OSPFv3 OSPFv3 Global Settings as shown below Figure 5 47 OSPFv3 Global Settings window The fields that can be configured or displayed are described below Parame...

Page 200: ...ther the OSPFv3 stub area imports inter area prefix LSA advertisements or not Metric 0 65535 Enter the default cost of OSPFv3 stub area Click the Apply button to accept the changes made Click the View...

Page 201: ...ely identifies the OSPFv3 area in the OSPFv3 domain Priority 0 255 Enter the priority used in the election of the Designated Router DR It is a number between 0 and 255 Its default value is 1 Hello Int...

Page 202: ...Parameter Description Area ID Enter a 32 bit number in the form of an IPv4 address that uniquely identifies the OSPFv3 area in the OSPFv3 domain Neighbor ID The OSPFv3 router ID for the remote area H...

Page 203: ...Area Aggregation Settings This window is used to configure the OSPFv3 area aggregation settings To view the following window click L3 Features OSPF OSPFv3 OSPFv3 Area Aggregation Settings as shown bel...

Page 204: ...ls of the specific entry For example click the View Detail link under Router LSA the following window will appear Figure 5 56 OSPFv3 LSDB Router LSA Table window Click the Back button to return to the...

Page 205: ...r the router ID of the neighbor Click the Find button to find the specified entry Click the View All button to view all the entries OSPFv3 Virtual Neighbor Table This window is used to display OSPFv3...

Page 206: ...e is not advertised for a period of time usually 180 seconds the route is removed from the routing table RIP does not have an explicit method to detect routing loops Many RIP implementations include a...

Page 207: ...rk is the same as the subnet mask used by the address This means the RIP version 1 cannot be used to propagate classless addresses RIP 1 Route Interpretation Routers running RIP version 1 must send di...

Page 208: ...it is removed from routing table Interface Name Specifies the IP interface name to display Click the Apply button to accept the changes made for each individual section Click the Find button to find t...

Page 209: ...g To view the following window click L3 Features RIP RIPng RIPng Global Settings as shown below Figure 5 63 RIPng Global Settings window The fields that can be configured are described below Parameter...

Page 210: ...y routers that they will become members of a multicast group The Internet Group Management Protocol IGMP is used to communicate this information IGMP is also used to periodically check the multicast g...

Page 211: ...t to join a group A host will never send a report when it wants to leave a group for version 1 A host will send a leave report when it wants to leave a group for version 2 Multicast routers send IGMP...

Page 212: ...hip reports and timers of the multicast group These filters are used to maintain a list of multicast sources and groups of multicast receivers that more accurately reflect the actual sources and recei...

Page 213: ...time is 10 seconds Robustness Variable 1 7 A tuning variable to allow for subnetworks that are expected to lose a large number of packets A value between 1 and 7 can be entered with larger values bei...

Page 214: ...n the Switch To view the following window click L3 Features IP Multicast Routing Protocol IGMP IGMP Group Table as shown below Figure 5 691 IGMP Group Table window The fields that can be configured ar...

Page 215: ...e nodes that wish to receive multicast packets on their directly attached links and to discover specifically which multicast addresses are of interest to those neighboring nodes The protocol is embed...

Page 216: ...sending an MLD response report The default time is 10 seconds Robustness Variable 2 7 A tuning variable to allow for subnetworks that are expected to lose a large number of packets A value between 2 a...

Page 217: ...Routing Information Protocol RIP but is extended for multicast delivery DVMRP builds a routing table to calculate shortest paths back to the source of a multicast message but defines a route cost sim...

Page 218: ...ed on this switch Click the Edit button to re configure the specific entry DVMRP Routing Table This window is used to display DVMRP routing table on the Switch To view the following window click L3 Fe...

Page 219: ...VMRP Routing Next Hop Table window The fields that can be configured are described below Parameter Description Interface Name Enter the name of the interface Source IP Address Enter the IP address of...

Page 220: ...een received A Hello packet will simply state that the router is present and ready to become a part of the RP s distribution tree Once a router has accepted a member of the IGMP group and it is PIM SM...

Page 221: ...hes PIM DM then removes these branches prunes them from the multicast delivery tree Because a member of a pruned branch of a multicast delivery tree may want to join a multicast delivery group at some...

Page 222: ...tch over to the shortest path tree When the switchover mode is set to never the last hope router will always receive multicast data from the shared tree When the mode is set to immediately the last ho...

Page 223: ...Boot Strap Router BSR for the PIM enabled network The Boot Strap Router holds the information which determines which router on the network is to be elected as the RP for the multicast group and then t...

Page 224: ...w Parameter Description Candidate RP Hold Time 0 255 This field is used to set the time Candidate RP CRP advertisements are valid on the PIM SM enabled network If CRP advertisements are not received b...

Page 225: ...lick L3 Features IP Multicast Routing Protocol PIM PIM for IPv4 PIM Static RP Settings as shown below Figure 5 847 PIM Static RP Settings window The fields that can be configured are described below P...

Page 226: ...nter the name of the IP interface for which you want to display the current PIM neighbor routing table Neighbor IP Address Enter the IP address of the destination Neighbor Netmask Enter the netmask of...

Page 227: ...M PIM for IPv4 PIM SSM Settings as shown below Figure 5 92 PIM SSM Settings window The fields that can be configured are described below Parameter Description SSM Service Model State Click the radio b...

Page 228: ...nu to select the SPT switchover mode on the last hop switch Never The mode will never switch to SPT This is the default value Immediately The mode will immediately switch to SPT Register Checksum Calc...

Page 229: ...umerically higher values for this parameter indicate higher priorities Propagation Delay 0 32 Enter the expected propagation delay between the PIM for IPv6 routers on this network or link Override Int...

Page 230: ...tings as shown below Figure 5 896 PIM for IPv6 Candidate BSR Settings window The fields that can be configured are described below Parameter Description Interface Name Enter the IP interface used in t...

Page 231: ...to create a static RP To view the following window click L3 Features IP Multicast Routing Protocol PIM PIM for IPv6 PIM for IPv6 Static RP Settings as shown below Figure 5 918 PIM for IPv6 Static RP S...

Page 232: ...is used to display the current PIM for IPv6 multicast route table To view the following window click L3 Features IP Multicast Routing Protocol PIM PIM for IPv6 PIM for IPv6 Multicast Route Table as s...

Page 233: ...n the S G or S G rpt entries will be displayed otherwise the G entries will be displayed Click the Back button to return to the previous window Click the Find button to find the source address entered...

Page 234: ...a specific page when multiple pages exist PIM for IPv6 Multicast Route Star G Table This window is used to display the multicast routing information for G entries generated by PIM for IPv6 Users can g...

Page 235: ...ute Star G Table View Detail window Click the Back button to return to the previous window Click the View Detail button to display the information of the specific entry Click the View Detail button to...

Page 236: ...icast group address Source Address Enter the source IPv6 interface Click the Find button to find the group address source address or RPT option entered Click the View All button to view all S G or S G...

Page 237: ...dow To view the following window click L3 Features IP Multicast Routing Protocol PIM PIM for IPv6 PIM for IPv6 Multicast Route S G Table select RPT click find button as shown below Figure 5 111 PIM fo...

Page 238: ...f the VRRP routers on the LAN When a virtual router fails the election protocol will select a virtual router with the highest priority to be the Master router on the LAN This retains the link and the...

Page 239: ...process The VRRP Priority value may determine if a higher priority VRRP router overrides a lower priority VRRP router A higher priority will increase the probability that this router will become the M...

Page 240: ...e the backup router from becoming the Master router This setting must be consistent with all routers participating within the same VRRP group Checking Critical IP Specifies the state of checking the s...

Page 241: ...VRRP message packets received by a router If the two passwords are not exactly the same the packet will be dropped IP Selecting this parameter will require the user to set an IP for authentication in...

Page 242: ...re applied Synchronization Usually a BGP speaker does not advertise a route to an external neighbor unless that route is local or exists in the IGP By default synchronization between BGP and the IGP i...

Page 243: ...the network Hold Time 0 65535 The valid values are from 0 to 65535 The system will declare a peer as dead if a keepalive message is received that is more than the hold time The default value is 180 s...

Page 244: ...tion entered Click the Find button to locate a specific entry based on the information entered Click the Delete All button to remove all the entries listed Click the View All button to display all the...

Page 245: ...w Parameter Description Dampening State Use the drop down menu to enable or disable the BGP dampening function s state Half Life 1 45 Enter the time in minutes after which the penalty of the reachable...

Page 246: ...up Settings window The fields that can be configured are described below Parameter Description Peer Group Name Enter the name of the BGP peer group Action Choose among None Add or Delete None is the d...

Page 247: ...ribed below Parameter Description Peer Group Name Enter the name of the BGP peer group IP Address Enter the IP address of the BGP speaking neighbor Remote AS Number 1 65535 Click the radio button and...

Page 248: ...ecified Click the Apply button to accept the changes made BGP Neighbor Password Settings This window is used to configure BGP neighbor password settings To view the following window click L3 Features...

Page 249: ...menu to enable or disable the state If the state is changed from Enabled to Disabled the session with the neighbor peer will be terminated Activity Click the radio button and use the drop down menu t...

Page 250: ...nfigured are described below Parameter Description IP Address Click the radio button and use the drop down menu to select the IP address of the BGP speaking neighbor Peer Group Name Click the radio bu...

Page 251: ...ow click L3 Features BGP BGP Neighbor BGP Neighbor Timer Settings as shown below Figure 5 11831 BGP Neighbor Timer Settings window The fields that can be configured are described below Parameter Descr...

Page 252: ...y interval default value Click the Apply button to accept the changes made BGP Neighbor Map Settings This window is used to configure BGP neighbor map settings To view the following window click L3 Fe...

Page 253: ...to either inbound or outbound traffic Prefix List Action Use the drop down menu to select Add or Delete Prefix List Name Enter the name of a prefix list to be applied as a filter The filtering can be...

Page 254: ...ng table learned from the neighbor Received Prefix Filter Select to display the prefix filter information that is received from a BGP neighbor Statistics Select to display the statistical information...

Page 255: ...rs in the cluster to recognize updates from peers in the same cluster and reduces the number of updates that needs to be stored in BGP routing tables Setting the cluster ID to 0 0 0 0 will remove spec...

Page 256: ...ch is used to specify a BGP confederation If it is set to zero the BGP confederation number is deleted By default this setting is zero Confederation Peer Action Use the drop down menu to select Add or...

Page 257: ...the changes made Click the Back button to return to the previous window Click the Delete button to remove the specific entry BGP Community List Settings This window is used to configure the matching r...

Page 258: ...n another sub AS in the same confederation and to the external peers No Advertise Routes with this community will not be advertised to any peer either internal or external No Export Routes with this c...

Page 259: ...ess Specify to reset the session with the specified neighbor AS Specify to reset sessions with BGP peers in the specified Autonomous System Peer Group Specify to reset a peer group External Specify al...

Page 260: ...w Figure 5 1336 BGP Routing Table window The fields that can be configured are described below Parameter Description Type Use the drop down menu to select Regexp Filter List Route Map Prefix List CIDR...

Page 261: ...nity List Enter the community list If the Exact Match check box is selected communities need to match exactly IP Address Display the host route that matches the specified IP address Netowork Display t...

Page 262: ...To view the following window click L3 Features IP Route Filter IP Prefix List Settings as shown below Figure 5 1369 IP Prefix List Settings window The fields that can be configured are described belo...

Page 263: ...all the entries Click the View Detail link to see the following window Figure 5 13851 IP Prefix List Settings View Detail window The fields that can be configured are described below Parameter Descrip...

Page 264: ...rmation entered Click the View All button to display all the existing entries Click the Delete All button to remove all the entries listed Click the View Detail Click the Delete button to remove the s...

Page 265: ...All button to remove all the entries listed Click the View Detail Click the Delete button to remove the specific entry link to view more information regarding the specific entry Click the View Detail...

Page 266: ...e community string Tick the Exact check box to present all the specified communities IP Address List Click the radio button and specify to match the route according to the access list IP Address Prefi...

Page 267: ...eceives a route with a metric then this metric will be used in best path selection This can be overwritten by the metric that is ingress set for the route If the received route has neither metric attr...

Page 268: ...will be sent to peers in the same AS or in other sub autonomous systems within a confederation but will not be sent to an external BGP eBGP peer No Advertise Routes with this community will not be ad...

Page 269: ...figure a specific entry listed Click the Delete button to remove a specific entry listed IGMP Static Group Settings This window is used to create an IGMP static group on the switch To view the followi...

Page 270: ...iority queuing Advantages of QoS Figure 6 1 Mapping QoS on the Switch The picture above shows the default priority setting for the Switch Class 7 has the highest priority of the seven priority classes...

Page 271: ...ce A1 B1 C1 D1 E1 F1 G1 H1 A2 B2 C2 D2 E2 F2 G2 A3 B3 C3 D3 E3 F3 A4 B4 C4 D4 E4 A5 B5 C5 D5 A6 B6 C6 A7 B7 A8 A1 B1 C1 D1 E1 F1 G1 H1 For weighted round robin queuing if each CoS queue has the same w...

Page 272: ...scription From Port To Port Select the starting and ending ports to use Priority Use the drop down menu to select a value from 0 to 7 Click the Apply button to accept the changes made 802 1p User Prio...

Page 273: ...ge but also for all the incoming tagged packets with 802 1p tag Click the Apply button to accept the changes made Bandwidth Control The bandwidth control settings are used to place a ceiling on the tr...

Page 274: ...allows the input of the data rate that will be the limit for the selected port The user may choose a rate between 64 and 10240000 Kbits per second Effective RX If a RADIUS server has assigned the RX...

Page 275: ...mit check box to have unlimited rate of packets received by the specified queue Max Rate 64 10240000 Enter the maximum rate for the queue For no limit select the No Limit option Click the Apply button...

Page 276: ...et storm continues that port will be placed in Shutdown Forever mode which will cause a warning message to be sent to the Trap Receiver Once in Shutdown Forever mode the method of recovering the port...

Page 277: ...een 5 and 600 seconds with a default setting of 5 seconds Threshold 0 255000 Specifies the maximum number of packets per second that will trigger the Traffic Control function to commence The configura...

Page 278: ...in all windows and screens until the user recovers these ports NOTE The minimum granularity of storm control on a GE port is 1pps DSCP DSCP Trust Settings This window is used to setup DSCP Trust Setti...

Page 279: ...dow changes as shown below Figure 6 9 DSCP Map Settings Window The following parameters may be set Parameter Description From Port To Port Use the drop down menu to select the port range to use for th...

Page 280: ...usy port and forward the packet directly to have lower latency and better performance On this page the user can enable or disable HOL Blocking Prevention To view the following window click QoS HOL Blo...

Page 281: ...packets in an even distribution in priority classes of service Click the Apply button to accept the changes made QoS Scheduling Mechanism Changing the output scheduling used for the hardware queues in...

Page 282: ...ism Strict The highest class of service is the first to process traffic That is the highest class of service will finish before other queues empty Weighted Round Robin Use the weighted round robin alg...

Page 283: ...ured are described below Parameter Description Type Use the drop down menu to select the general ACL Rule types Normal Selecting this option will create a Normal ACL Rule CPU Selecting this option wil...

Page 284: ...To Use the drop down menu to select and enter the information that this rule will be applied to Ports Enter a port number or a port range VLAN Name Enter a VLAN name VLAN ID Enter a VLAN ID Click the...

Page 285: ...file configuration one for IPv6 address based profile configuration one for IPv4 address based profile configuration and one for packet content profile configuration Adding an Ethernet ACL Profile The...

Page 286: ...examine the 802 1p priority value of each packet header and use this as the or part of the criterion for forwarding Ethernet Type Selecting this option instructs the Switch to examine the Ethernet ty...

Page 287: ...box if you want to re write the 802 1p default priority of a packet to the value entered in the Priority field which meets the criteria specified previously in this command before forwarding it on to...

Page 288: ...essage and the access rule will not be configured VLAN Name Specify the VLAN name to apply to the access rule VLAN ID Specify the VLAN ID to apply to the access rule Click the Back button to discard t...

Page 289: ...truct the Switch to examine the IPv6 address in each frame s header Select Packet Content to instruct the Switch to examine the packet content in each frame s header 802 1Q VLAN Selecting this option...

Page 290: ...The user may filter packets by filtering certain flag bits within the packets by checking the boxes corresponding to the flag bits of the TCP field The user may choose between urg urgent ack acknowled...

Page 291: ...are described below Parameter Description Access ID 1 256 Type in a unique identifier number for this access This value can be set from 1 to 256 Auto Assign Tick the check box will instruct the Switch...

Page 292: ...x and enter the name of the Time Range settings that has been previously configured in the Time Range Settings window This will set specific times when this access rule will be implemented on the Swit...

Page 293: ...ect Packet Content to instruct the Switch to examine the packet content in each frame s header IPv6 Class Ticking this check box will instruct the Switch to examine the class field of the IPv6 header...

Page 294: ...ate button to create a profile After clicking the Show Details button the following page will appear Figure 7 14 Access Profile Detail Information window IPv6 ACL Click the Show All Profiles button to...

Page 295: ...of a packet to the value entered in the Priority field which meets the criteria specified previously in this command before forwarding it on to the specified CoS queue Otherwise a packet will have it...

Page 296: ...denote all ports on the Switch VLAN Name Specify the VLAN name to apply to the access rule VLAN ID Specify the VLAN ID to apply to the access rule Click the Back button to discard the changes made an...

Page 297: ...h packet header Select IPv4 ACL to instruct the Switch to examine the IPv4 address in each frame s header Select IPv6 ACL to instruct the Switch to examine the IPv6 address in each frame s header Sele...

Page 298: ...e will appear Figure 7 19 Access Profile Detail Information Packet Content ACL Click the Show All Profiles button to navigate back to the Access Profile List window NOTE Address Resolution Protocol AR...

Page 299: ...irroring must be enabled and a target port must be set Priority 0 7 Tick the corresponding check box if you want to re write the 802 1p default priority of a packet to the value entered in the Priorit...

Page 300: ...Rules button to navigate back to the Access Rule List CPU Access Profile List Due to a chipset limitation and needed extra switch security the Switch incorporates CPU Interface filtering This added fe...

Page 301: ...lick the Delete All button to remove all access profiles from this table Click the Show Details button to display the information of the specific profile ID entry Click the Add View Rules button to vi...

Page 302: ...n each frame s header Select IPv6 to instruct the Switch to examine the IP address in each frame s header Select Packet Content Mask to specify a mask to hide the content of the packet header Source M...

Page 303: ...er clicking the Add View Rules button the following page will appear Figure 7 26 CPU Access Rule List Ethernet ACL Click the Add Rule button to create a new CPU ACL rule in this profile Click the Back...

Page 304: ...Range settings that has been previously configured in the Time Range Settings window This will set specific times when this access rule will be implemented on the Switch Ports Ticking the All Ports c...

Page 305: ...n each frame s header Select Packet Content Mask to specify a mask to hide the content of the packet header 802 1Q VLAN Selecting this option instructs the Switch to examine the VLAN part of each pack...

Page 306: ...mask for the source port in hex form hex 0x0 0xffff which you wish to filter dst port mask Specify a TCP port mask for the destination port in hex form hex 0x0 0xffff which you wish to filter Select U...

Page 307: ...he fields that can be configured are described below Parameter Description Access ID 1 100 Type in a unique identifier number for this access This value can be set from 1 to 100 Auto Assign Tick the c...

Page 308: ...lowing page will appear Figure 7 33 CPU Access Rule Detail Information IPv4 ACL Click the Show All Rules button to navigate back to the CPU Access Rule List Adding a CPU IPv6 ACL Profile The window sh...

Page 309: ...field of the IPv6 header This flow label field is used by a source to label sequences of packets such as non default quality of service or real time service packets IPv6 Source Mask The user may speci...

Page 310: ...e packets that match the access profile are forwarded by the Switch according to any additional rule added see below Select Deny to specify that the packets that match the access profile are not forwa...

Page 311: ...tifier number for this profile set This value can be set from 1 to5 Select ACL Type Select profile based on Ethernet MAC Address IPv4 address IPv6 address or packet content mask This will change the m...

Page 312: ...wing page will appear Figure 7 40 CPU Access Profile Detail Information Packet Content ACL Click the Show All Profiles button to navigate back to the CPU ACL Profile List window After clicking the Add...

Page 313: ...the offset value specified Offset 0 15 Enter a value in hex form to mask the packet from the beginning of the packet to the 15th byte Offset 16 31 Enter a value in hex form to mask the packet from by...

Page 314: ...ACL rules Click the Find button to locate a specific entry based on the information entered Click the Delete button to remove the specific entry selected Enter a page number and click the Go button to...

Page 315: ...ceed the boundaries of the CBS packet size The EBS is to be configured for an equal or larger rate than the CBS DSCP Differentiated Services Code Point The part of the packet header where the color wi...

Page 316: ...ID for the flow meter Profile Name Here the user can enter the Profile Name for the flow meter Access ID Here the user can enter the Access ID for the flow meter Mode Rate Specify the rate for single...

Page 317: ...replace the DSCP field of these packets by checking its radio button and entering a new DSCP value in the allotted field Counter Use this parameter to enable or disable the packet counter for the spe...

Page 318: ...et from 1 to 4 Profile Name Enter a profile name for the profile created Select ACL Type Select profile based on Ethernet MAC Address IPv4 address or IPv6 address This will change the window according...

Page 319: ...etails button the following page will appear Figure 7 50 Egress Access Profile Detail Information window Ethernet ACL Click the Show All Profiles button to navigate back to the Egress Access Profile L...

Page 320: ...the specified CoS queue Otherwise a packet will have its incoming 802 1p user priority re written to its original value before being forwarded by the Switch For more information on priority queues CoS...

Page 321: ...and return to the previous page Click the Apply button to accept the changes made After clicking the Show Details button in the Egress Access Rule List the following page will appear Figure 7 53 Egres...

Page 322: ...o instruct the Switch to examine the IPv4 address in each frame s header Select IPv6 ACL to instruct the Switch to examine the IPv6 address in each frame s header 802 1Q VLAN Selecting this option ins...

Page 323: ...may filter packets by filtering certain flag bits within the packets by checking the boxes corresponding to the flag bits of the TCP field The user may choose between urg urgent ack acknowledgement p...

Page 324: ...8 Type in a unique identifier number for this access This value can be set from 1 to 128 Auto Assign Tick the check box will instruct the Switch to automatically assign an Access ID for the rule being...

Page 325: ...ange of ports is to be configured the Auto Assign check box MUST be ticked in the Access ID field of this window If not the user will be presented with an error message and the access rule will not be...

Page 326: ...s header Select IPv6 ACL to instruct the Switch to examine the IPv6 address in each frame s header IPv6 Class Ticking this check box will instruct the Switch to examine the class field of the IPv6 hea...

Page 327: ...ll appear Figure 7 60 Egress Access Profile Detail Information window IPv6 ACL Click the Show All Profiles button to navigate back to the Egress Access Profile List window After clicking the Add View...

Page 328: ...coming 802 1p user priority re written to its original value before being forwarded by the Switch For more information on priority queues CoS queues and mapping for 802 1p see the QoS section of this...

Page 329: ...he packet flow based metering based on an egress access profile and rule To view this window click ACL Egress ACL Flow Meter as shown below Figure 7 64 Egress ACL Flow Meter window The fields that can...

Page 330: ...DSCP The packet is set to drop for packets with a high precedence trTCM Specify the two rate three color mode CIR Specify the Committed information Rate The unit is Kbps CIR should always be equal or...

Page 331: ...et counter for the specified ACL entry in the yellow flow Violate This field denotes the red packet flow Red packet flows may have excess packets permitted through or dropped Users may replace the DSC...

Page 332: ...g a Client and Server based access control model This is accomplished by using a RADIUS server to authenticate users trying to access a network by relaying Extensible Authentication Protocol over LAN...

Page 333: ...certification information from the Client through EAPOL packets which is the only information allowed to pass through the Authenticator before access is granted to the Client The second purpose of th...

Page 334: ...MAC addresses by port and set them in a list Each MAC address must be authenticated by the Switch using a remote RADIUS server before being allowed access to the Network The original intent behind th...

Page 335: ...ure 8 9 802 1X Global Settings window The fields that can be configured are described below Parameter Description Authentication State Use the drop down menu to enable or disable the 802 1X function A...

Page 336: ...e is 30 seconds however if the type of challenge involved in the current exchange demands a different value of timeout for example if the challenge requires an action on the part of the user then the...

Page 337: ...ges between the client and the authentication server The default setting is Auto Capability This allows the 802 1X Authenticator settings to be applied on a per port basis Select Authenticator to appl...

Page 338: ...ow implements 802 1X Guest VLANs These VLANs should have limited access rights and features separate from other VLANs on the network To implement 802 1X Guest VLANs the user must first create a VLAN o...

Page 339: ...ity 802 1X Guest VLAN Settings as shown below Figure 8 13 Guest VLAN Settings window The fields that can be configured are described below Parameter Description VLAN Name Enter the pre configured VLAN...

Page 340: ...between the Switch and the RADIUS server Accounting Port 1 65535 Set the RADIUS account server s UDP port which is used to transmit RADIUS accounting statistics between the Switch and the RADIUS serv...

Page 341: ...elow Figure 8 16 RAIUS Authentication window The user may also select the desired time interval to update the statistics between 1s and 60s where s stands for seconds The default value is one second T...

Page 342: ...cess Challenge a timeout or retransmission Timeouts The number of authentication timeouts to this server After a timeout the client may retry to the same server send to a different server or give up A...

Page 343: ...ry to the same server send to a different server or give up A retry to the same server is counted as a retransmit as well as a timeout A send to a different server is counted as an Accounting Request...

Page 344: ...io buttons to enable or disable DHCP snooping IPv4 for IP MAC port binding The default is Disabled DHCP Snooping IPv6 Click the radio buttons to enable or disable DHCP snooping IPv6 for IP MAC port bi...

Page 345: ...t value is Disabled IP Inspection When both ARP and IP inspections are enabled all IP packets are checked The legal IP packets are forwarded while the illegal IP packets are dropped When IP Inspection...

Page 346: ...to the IP Address set above Ports Specify the switch ports for which to configure this IP MAC binding entry IP Address MAC Address Tick the All Ports check box to configure this entry for all ports o...

Page 347: ...MAC Port Binding IMPB DHCP Snooping DHCP Snooping Maximum Entry Settings as shown below Figure 8 22 DHCP Snooping Max Entry Settings window The fields that can be configured are described below Param...

Page 348: ...Tick the All Ports check box to select all entries for all ports Tick the IPv4 check box to select IPv4 DHCP snooping learned entries Tick the IPv6 check box to select IPv6 DHCP snooping learned entri...

Page 349: ...learned with ND snooping Maximum Entry 1 50 Enter the maximum entry value Tick the No Limit check box to have unlimited maximum number of the learned entries Click the Apply button to accept the chan...

Page 350: ...t levels of authorization There are certain limitations and regulations regarding MAC based access control Notes about MAC based Access Control 1 Once this feature is enabled for a port the Switch wil...

Page 351: ...s window RADIUS Use this method to utilize a remote RADIUS server as the authenticator for MAC based access control Remember the MAC list must be previously set on the RADIUS server RADIUS Authorizati...

Page 352: ...matched in this window it will be placed in the VLAN associated with it here The Switch administrator may enter up to 128 MAC addresses to be authenticated using the local method configured here To vi...

Page 353: ...th a remote RADIUS server The client user initiates the authentication process of WAC by attempting to gain Web access D Link s implementation of WAC uses a virtual IP that is exclusively used by the...

Page 354: ...This TCP port for HTTP or HTTPs is used to identify the HTTP or HTTPs packets that will be trapped to the CPU for authentication processing or to access the login page If not specified the default po...

Page 355: ...al IP address This address is only used by WAC and is not known by any other modules of the Switch Virtual IPv6 Enter a virtual IPv6 address This address is only used by WAC and is not known by any ot...

Page 356: ...r Name Enter the user name of up to 15 alphanumeric characters of the guest wishing to access the Web through this process This field is for administrators who have selected Local as their Web based a...

Page 357: ...State Use this drop down menu to enable the configured ports as WAC ports Idle Time 1 1440 If there is no traffic during the Idle Time parameter the host will be moved back to the unauthenticated stat...

Page 358: ...ticating Tick this check box to clear all authenticating users for a port Blocked Tick this check box to clear all blocked users for a port Click the Find button to locate a specific entry based on th...

Page 359: ...WAC Customize Page window Complete the WAC authentication information on this window to set the WAC page settings Click the Apply button to implement the changes made Click the Set to default button...

Page 360: ...te Click the radio buttons to enable or disable JWAC on the Switch Virtual IP Enter the JWAC Virtual IP address that is used to accept authentication requests from an unauthenticated host The Virtual...

Page 361: ...Enter the time in second for the Quarantine Server Error Timeout When the Quarantine Server Monitor is enabled the JWAC Switch will periodically check if the Quarantine works okay If the Switch does...

Page 362: ...ication attempts allowed on each port at the same time The default value is 100 Aging Time 1 1440 Enter the time period during which an authenticated host will remain in the authenticated state Tick t...

Page 363: ...rname of up to 15 alphanumeric characters Password Enter the password the administrator has chosen for the selected user This field is case sensitive and must be a complete alphanumeric string Confirm...

Page 364: ...client hosts being temporarily blocked because of the failure of authentication Click the Find button to locate a specific entry based on the information entered Click the Clear button to remove entr...

Page 365: ...s window to set the JWAC page settings Enter a name for the Authentication in the first field and then click the Apply button Next enter a User Name and a Password and then click the Enter button Comp...

Page 366: ...regarded as authenticated If guest VLAN is enabled clients will stay on the guest VLAN otherwise they will stay on the original VLAN From Port To Port Use the drop down menus to select a range of por...

Page 367: ...ports from a guest VLAN To view this window click Security Compound Authentication Compound Authentication Guest VLAN Settings as shown below Figure 8 42 Compound Authentication Guest VLAN Settings wi...

Page 368: ...delimiter the format is AABBCCDDEEFF Delimiter Number Use the drop down menu to select the delimiter number 1 Single delimiter the format is AABBCC DDEEFF 2 Double delimiter the format is AABB CCDD E...

Page 369: ...u allows the option of how the MAC address table locking will be implemented on the Switch for the selected group of ports The options are Permanent The locked address will not age out even if the Swi...

Page 370: ...by a specific VLAN The default value is No Limit Click the Apply button to accept the changes made Click the Back button to discard the changes made and return to the previous page Port Security VLAN...

Page 371: ...l be displayed MAC Address The MAC address of the entry in the forwarding database table that has been permanently learned by the Switch Lock Mode The type of MAC address in the forwarding database ta...

Page 372: ...e two states in BPDU protection function One is normal state and another is under attack state The under attack state have three modes drop block and shutdown A BPDU protection enabled port will enter...

Page 373: ...over Time 60 1000000 Enter the BPDU protection Auto Recovery timer The default value of the recovery timer is 60 Tick the Infinite check box for not auto recovering From Port To Port Select a range of...

Page 374: ...Loopback Detection Settings window The fields that can be configured are described below Parameter Description Loopback Detection State Use the radio button to enable or disable loopback detection The...

Page 375: ...ffic that does not increase the overhead of the master switch CPU To view this window click Security Traffic Segmentation Settings as shown below Figure 8 51 Traffic Segmentation Settings window The f...

Page 376: ...e one access profile and three access rules automatically If the user enables the extensive NETBIOS filter the switch will create one more access profile and one more access rule To view this window c...

Page 377: ...try the first time the DHCP client MAC address is used as the client MAC address The Source IP address is the same as the DHCP server s IP address UDP port number 67 These rules are used to permit the...

Page 378: ...CS XTACACS TACACS RADIUS commands allow users to secure access to the Switch using the TACACS XTACACS TACACS RADIUS protocols When a user logs in to the Switch or tries to access the administrator lev...

Page 379: ...al none for authentication These techniques will be listed in an order preferable and defined by the user for normal user authentication on the Switch and may contain up to eight authentication techni...

Page 380: ...entication Policy Settings as shown below Figure 8 57 Authentication Policy Settings window The fields that can be configured are described below Parameter Description Authentication Policy Use the dr...

Page 381: ...eviously configured method list The user may use the default Method List or other Method List configured by the user See the Login Method Lists Settings window in this section for more information Ena...

Page 382: ...ified The fields that can be configured are described below Parameter Description Group Name Enter a new server group name Click the Add button to add a new entry based on the information entered Clic...

Page 383: ...e to the Switch More than one authentication protocol can be run on the same physical server host but remember that TACACS XTACACS TACACS RADIUS are separate entities and are not compatible with each...

Page 384: ...is used to authenticate the user When the local method is used the privilege level will be dependent on the local account privilege configured on the Switch Successful login using any of these techniq...

Page 385: ...s command will affect the authentication result For example if a user enters a sequence of methods like TACACS XTACACS Local Enable the Switch will send an authentication request to the first TACACS h...

Page 386: ...te user level privileges to administrator privileges he or she will be prompted to enter the password configured here that is locally set on the Switch To view this window click Security Access Authen...

Page 387: ...ll affect the security level and the performance of the secured connection The information included in the cipher suites is not included with the Switch and requires downloading from a third source in...

Page 388: ...escription RSA with RC4_128_MD5 This cipher suite combines the RSA key exchange stream cipher RC4 encryption with 128 bit keys and the MD5 Hash Algorithm Use the radio buttons to enable or disable thi...

Page 389: ...urity features is an essential tool in today s networking environment It is a powerful guardian against numerous existing security hazards that now threaten network communications The steps required t...

Page 390: ...ed and the user must reconnect to the Switch to attempt another login The number of maximum attempts may be set between 2 and 20 The default setting is 2 Rekey Timeout Use the drop down menu to set th...

Page 391: ...BC Use the check box to enable or disable the Advanced Encryption Standard AES192 encryption algorithm with Cipher Block Chaining The default is enabled AES256 CBC Use the check box to enable or disab...

Page 392: ...er This User Name must be a previously configured user account on the Switch Authentication Method The administrator may choose one of the following to set the authorization for users attempting to ac...

Page 393: ...guard Engine function was added to the Switch s software The Safeguard Engine can help the overall operability of the Switch by minimizing the workload of the Switch while the attack is ongoing thus m...

Page 394: ...broadcast packets will return to 5 seconds and the process will resume In Fuzzy mode once the Safeguard Engine has entered the Exhausted mode the Safeguard Engine will decrease the packet flow by hal...

Page 395: ...tion as a percentage where the Switch leaves the Safeguard Engine state and returns to normal mode Trap Log Use the drop down menu to enable or disable the sending of messages to the device s SNMP age...

Page 396: ...between 0 and 65 535 seconds with a default value of 0 seconds To view this window click Network Application DHCP DHCP Relay DHCP Relay Global Settings as shown below Figure 9 1 DHCP Relay Global Sett...

Page 397: ...the relay agent will check the validity of the packet s option 82 field If the Switch receives a packet that contains the option 82 field from a DHCP client the Switch drops the packet because it is...

Page 398: ...Unit ID 7 Port The incoming port number of the DHCP client packet the port number starts from 1 Remote ID sub option format Figure 9 3 Remote ID Sub option Format 1 Sub option type 2 Length 3 Remote...

Page 399: ...n below Figure 9 5 DHCP Relay Option 60 Server Settings window The fields that can be configured are described below Parameter Description Server IP Address Enter the DHCP Relay Option 60 Server Relay...

Page 400: ...tch The option 60 string in the packet only need partial match with the specified string IP Address Enter the DHCP Relay Option 60 IP address String Enter the DHCP Relay Option 60 String value Click t...

Page 401: ...vices that request this information This occurs when a DHCP enabled device is booted on or attached to the locally attached network This device is known as the DHCP client and when enabled it will emi...

Page 402: ...s that all IP addresses in a DHCP pool subnet are available for assigning to DHCP clients You must use this page to specify the IP address that the DHCP server should not assign to clients This comman...

Page 403: ...red are described below Parameter Description IP Address Enter the network address of the pool Netmask Enter the Netmask for the network address NetBIOS Node Type NetBIOS node type for a Microsoft DHC...

Page 404: ...the Back button to discard the changes made and return to the previous page DHCP Server Manual Binding An address binding is a mapping between the IP address and MAC address of a client The IP address...

Page 405: ...hether an IP address is conflict with other host before binding this IP The IP address which has been identified conflict will be moved to the conflict IP database The system will not attempt to bind...

Page 406: ...to add a new entry based on the information entered Click the Find button to locate a specific entry based on the information entered Click the Delete All button to remove all the entries listed Clic...

Page 407: ...w entry based on the information entered Click the Back button to return to the previous window Click the Delete All button to remove all the entries listed Click the Delete button to remove the speci...

Page 408: ...dynamic binding information Click the Clear button to clear all the information entered in the fields Click the Find button to locate a specific entry based on the information entered Click the Clear...

Page 409: ...layed in this message The default value is 4 Click the Apply button to accept the changes made for each individual section DHCPv6 Relay Settings This window is used to configure the DHCPv6 relay state...

Page 410: ...bled VLAN Name This is the VLAN Name that identifies the VLAN the user wishes to apply the DHCP Local Relay operation State Enable or disable the configure DHCP Local Relay for VLAN state Click the Ap...

Page 411: ...of the next DNS server the client should contact Each client must be able to contact at least one DNS server and each DNS server must be able to contact at least one root server The address of the mac...

Page 412: ...s window is used to configure the DNS Resolver global state of the switch To view this window click Network Application DNS Resolver DNS Resolver Global Settings as shown below Figure 9 27 DNS Resolve...

Page 413: ...Resolver name servers To view this window click Network Application DNS Resolver DNS Resolver Dynamic Name Server Table as shown below Figure 9 29 DNS Resolver Dynamic Name Server Table window DNS Res...

Page 414: ...dow click Network Application RCP Server Settings as shown below Figure 9 32 RCP Server Settings Window The fields that can be configured are described below Parameter Description IP Address The IP ad...

Page 415: ...P Secondary Server The IPv4 address of the secondary server from which the SNTP information will be taken IPv6 SNTP Primary Server The IPv6 address of the primary server from which the SNTP informatio...

Page 416: ...Mean Time GMT Parameter Description DST Repeating Settings Using repeating mode will enable DST seasonal time adjustment Repeating mode requires that the DST beginning and ending date be specified us...

Page 417: ...Mb of flash storage space The configuration file number and firmware numbers are also fixed A compatible issue will occur in the event that the configuration file or firmware size exceeds the original...

Page 418: ...Click the Boot Up button to set a specific runtime image as the boot up image Click the Rename button to rename a specific file s name Click the Delete button to remove a specific file from the file...

Page 419: ...r the maintenance domain index used Level Use the drop down menu to select the maintenance domain level MIP This is the control creations of MIPs None Don t create MIPs This is the default value Auto...

Page 420: ...e 10 2 CFM MA Settings Window The fields that can be configured are described below Parameter Description MA Enter the maintenance association name MA Index Enter the maintenance association index VID...

Page 421: ...default value Chassis Transmit sender ID TLV with chassis ID information Manage Transmit sender ID TLV with manage address information Chassis Manage Transmit sender ID TLV with chassis ID informatio...

Page 422: ...de this port should be a tagged member of the MA s associated VLAN MEP Direction This is the MEP direction Inward Inward facing up MEP Outward Outward facing down MEP NOTE Only Outward is available wh...

Page 423: ...e previous page After clicking the Edit button the following page will appear Figure 10 7 CFM MEP Information Edit Window The fields that can be configured are described below Parameter Description ME...

Page 424: ...time before a defect is triggered before the fault can be re alarmed The unit is in centiseconds the range is 250 1000 The default value is 1000 Click the Apply button to accept the changes made Click...

Page 425: ...nterval of LCK PDU Level Tick the check box and use the drop down menu to select the client level ID to which the MEP sends LCK PDU The default client MD level is MD level at which the most immediate...

Page 426: ...click OAM CFM CFM MIPCCM Table as shown below Figure 10 11 CFM MIPCCM Table Window CFM Loopback Settings This window is used to CFM loopback settings To view this window click OAM CFM CFM Loopback Se...

Page 427: ...nktrace Settings Window The fields that can be configured are described below Parameter Description MEP Name Select and enter the Maintenance End Point name used MEP ID 1 8191 Select and enter the Mai...

Page 428: ...ion Port List Enter a port or range of ports to display Tick the All Ports check box to display all ports Type Transmit Selecting this option will display all the CFM packets transmitted Receive Selec...

Page 429: ...MP Table This window is used to display the CFM MP information To view this window click OAM CFM CFM MP Table as shown below Figure 10 16 CFM MP Table Window The fields that can be configured are desc...

Page 430: ...able the remote loopback Start Select to request the peer to change to the remote loopback mode Stop Select to request the peer to change to the normal operation mode Received Remote Loopback Use the...

Page 431: ...e options are Error Symbol Error Frame Error Frame Period and Error Frame Seconds Critical Link Event Use the drop down menu to select between Dying Gasp and Critical Event Threshold Enter the number...

Page 432: ...elect the port number to view Port List Enter a list of ports Tick the All Ports check box to select all ports Click the Find button to locate a specific entry based on the information entered Click t...

Page 433: ...eter Description Port Use the drop down menu to select the port number to view Port List Enter a list of ports Tick the All Ports check box to select all ports Click the Clear button to clear all the...

Page 434: ...al Shutdown If any unidirectional link is detected disable the port and log an event Normal Only log an event when a unidirectional link is detected Discovery Time 5 65535 Enter these ports neighbor d...

Page 435: ...tion limitations Cable length detection is only supported on GE ports NOTE The maximum cable diagnosis length is 120 meters NOTE The deviation of cable length detection is 5M for GE ports Open This pa...

Page 436: ...on as shown below Figure 11 1 CPU Utilization window To view the CPU utilization by port use the real time graphic of the Switch and or switch stack at the top of the web page by simply clicking on a...

Page 437: ...M and Flash utilization To view this window click Monitoring Utilization DRAM Flash Utilization as shown below Figure 11 2 DRAM Flash Utilization window Port Utilization This window is used to display...

Page 438: ...accept the changes made for each individual section Statistics Port Statistics Packets The Web manager allows various packet statistics to be viewed as either a line graph or a table Six windows are...

Page 439: ...icast address Multicast Counts the total number of good packets that were received by a multicast address Broadcast Counts the total number of good packets that were received by a broadcast address Sh...

Page 440: ...lds that can be configured are described below Parameter Description Port Use the drop down menu to choose the port that will display statistics Time Interval Select the desired setting between 1s and...

Page 441: ...le Click the link to display the information in a table rather than a line graph View Graphic link to display the information in a line graph rather than a table Transmitted TX To select a port to vie...

Page 442: ...t were transmitted by a multicast address Broadcast Counts the total number of good packets that were transmitted by a broadcast address Show Hide Check whether or not to display Bytes and Packets Cli...

Page 443: ...bed below Parameter Description Port Use the drop down menu to choose the port that will display statistics Time Interval Select the desired setting between 1s and 60s where s stands for seconds The d...

Page 444: ...at have errors received in the symbol on the physical labor Show Hide Check whether or not to display CRCError UnderSize OverSize Fragment Jabber Drop and SymbolErr errors Click the Apply button to ac...

Page 445: ...failed due to excessive collisions SingColl Single Collision Frames The number of successfully transmitted packets for which transmission is inhibited by more than one collision Collision An estimate...

Page 446: ...e port that will display statistics Time Interval Select the desired setting between 1s and 60s where s stands for seconds The default value is one second Record Number Select number of times the Swit...

Page 447: ...tets 4096 9216 The total number of packets including bad packets received that were between 4096 and 9216 octets in length inclusive excluding framing bits but including FCS octets Show Hide Check whe...

Page 448: ...ror packets to a remote switch A packet travels from the switch where the monitored packet is received passing through the intermediate switch and then to the switch where the sniffer is attached The...

Page 449: ...n which direction the packets will be monitored Click Add or Delete to add or delete source ports Redirect Port List Specify the output port list for the RSPAN VLAN packets If the redirect port is a L...

Page 450: ...ption Analyzer Server ID 1 4 The analyzer server ID specifies the ID of a server analyzer where the packet will be forwarded Owner Name The entity making use of this sFlow analyzer server When owner i...

Page 451: ...onfigured rate value multiplied by 256 is the actual rate For example if the rate is 20 the actual rate 5120 One packet will be sampled from every 5120 packets If set to 0 the sampler is disabled If t...

Page 452: ...e button to remove the specific entry Ping Broadcast Ping Relay Settings This window is used to enable or disable broadcast ping reply state device will reply broadcast ping request To view this windo...

Page 453: ...ain Name Click the radio button and enter the domain name of the host Repeat Pinging for Enter the number of times desired to attempt to Ping either the IPv4 address or the IPv6 address configured in...

Page 454: ...ndow The fields that can be configured are described below Parameter Description IPv4 Address IPv6 Address IP address of the destination station Domain Name The domain name of the destination end stat...

Page 455: ...the Start button to initiate the Trace Route After clicking the Start button the following page will appear Figure 11 28 Trace Route Result window Peripheral Device Environment The device environment...

Page 456: ...alarm message when the alarm is triggered To view this window click Monitoring Peripheral External Alarm Settings as shown below Figure 11 30 External Alarm Settings window Click the Refresh button to...

Page 457: ...he computer Select Configuration from the Type drop down menu and enter the File Path in the space provided and click Apply Figure 12 1 Save Configuration window Save Log allows the user to backup the...

Page 458: ...ion TFTP Server IP Enter the TFTP server IP address used IPv4 Click the radio button to enter the TFTP server IP address used IPv6 Click the radio button to enter the TFTP server IPv6 address used Dom...

Page 459: ...om HTTP This window allows the user to download firmware from a computer to the Switch and updates the switch Figure 12 6 Download Firmware from HTTP window The fields that can be configured are descr...

Page 460: ...ain name Destination File Enter the location and name of the Destination File Source File Enter the location and name of the Source File Click Upload to initiate the upload Upload Firmware to RCP This...

Page 461: ...a TFTP Server to the Switch and updates the switch Figure 12 10 Download Configuration File from TFTP window The fields that can be configured are described below Parameter Description TFTP Server IP...

Page 462: ...ownload Configuration from HTTP This window allows the user to download the configuration file from a computer to the Switch and updates the switch Figure 12 12 Download Configuration File from HTTP w...

Page 463: ...ton to enter the domain name Source File Enter the location and name of the Source File Destination File Enter the location and name of the Destination File Filter Use the drop down menu to Include Ex...

Page 464: ...that can be configured are described below Parameter Description Source File Enter the location and name of the Source File Filter Use the drop down menu to Include Exclude or Begin a filter like SNMP...

Page 465: ...red are described below Parameter Description RCP Server IP Enter the RCP Server IP Address used User Name Enter the appropriate Username used Destination File Enter the location and name of the Desti...

Page 466: ...ave Changes is not executed the Switch will return to the last saved configuration when rebooted Figure 12 19 Reset System window The fields that can be configured are described below Parameter Descri...

Page 467: ...xStack DGS 3620 Series Layer 3 Managed Stackable Gigabit Switch Web UI Reference Guide 457 Figure 12 21 System Rebooting window...

Page 468: ...wer on the Switch After the UART init is loaded to 100 the Switch will allow 2 seconds for the user to press the hotkey Shift 6 to enter the Password Recovery Mode Once the Switch enters the Password...

Page 469: ...interval is project dependent Log Message Port unitID portNum recovers from MAC based Access Control stop learning state Parameters description unitID The unit ID portNum The port number Warning Even...

Page 470: ...om a DHCPv6 server ipif name Name of the DHCPv6 client interface Informational Event description The ipv6 address obtained from a DHCPv6 server starts renewing Log Message The IPv6 address ipv6address...

Page 471: ...cond on a certain subnet Log Message IP Directed Broadcast packet rate is high on subnet IP s Parameters description IP the Broadcast IP destination address Informational Event description IP Directed...

Page 472: ...sion username Represent current login user ipaddr Represent client IP address macaddr Represent client MAC address warning Event description Configuration uploaded successfully Log Message RCP 7 Confi...

Page 473: ...ed successfully Log Message RCP 13 Attack log message uploaded by session successfully Username username IP ipaddr MAC macaddr Parameters description session The user s session username Represent curr...

Page 474: ...ters description session The user s session Username Represent current login user Ipaddr Represent client IP address macaddr Represent client MAC address informational Event description Configuration...

Page 475: ...ddr MAC macaddr Parameters description session The user s session Username Represent current login user Ipaddr Represent client IP address macaddr Represent client MAC address warning DNS Resolver Eve...

Page 476: ...description Port link down Log Message Port unitID portNum link down Parameters description unitID 1 Interger value 2 Represent the id of the device in the stacking system portNum 1 Interger value 2...

Page 477: ...r egressBandwidth The egress bandwidth of RADIUS assign unitID The unit ID portNum The port number Username The user that is being authenticated Informational Event description 802 1p default priority...

Page 478: ...deviceClass Parameters description portNum The port number chassisType chassis ID subtype Value list 1 chassisComponent 1 2 interfaceAlias 2 3 portComponent 3 4 macAddress 4 5 networkAddress 5 6 inte...

Page 479: ...ame time no voice device is detected in the aging interval for that port the log message will be sent Log Message Port portNum remove from Voice VLAN vid Parameters description portNum The port number...

Page 480: ...ddr IP address of BGP peer warning Event description BGP connection is closed due to receive notify packet Error Code and Error Subcode refer to RFC Log Message BGP 7 BGP connection is closed due to N...

Page 481: ...r with invalid community string Parameters Description ipaddr The IP address Informational OSPFv2 Enhancement Function Event description OSPF interface link state changed Log Message OSPF interface in...

Page 482: ...age OSPF state changed to Disabled Informational VRRP Debug Event description One virtual router state becomes Master Log Message VR vr id at interface intf name switch to Master Parameters descriptio...

Page 483: ...is deleted from switch L2 table Log Message Deleted a virtual MAC vrrp mac addr from L2 table Parameters description vrrp mac addr VRRP virtual MAC address Notice Event description A virtual MAC addr...

Page 484: ...box stacking box number of VRRP virtual MAC Error Event description Failed when adding a virtual MAC into switch chip s L3 table Log Message Failed to add virtual IP vrrp ip addr MAC vrrp mac addr in...

Page 485: ...SL client Information Event description Logout through Web SSL Log Message Logout through Web SSL Username username IP ipaddr Parameters description username The use name that used to login SSL server...

Page 486: ...enabled Informational Event description SSH server is disabled Log Message SSH server is disabled Informational Event description Authentication Policy is enabled Log Message Authentication Policy is...

Page 487: ...server ipaddr ipv6address Username username Parameters description local specify AAA local method none specify none method server specify AAA server method ipaddr IP address ipv6address IPv6 address...

Page 488: ...address unitID The unit ID portNum The port number Warning Event description This log will be triggered when the number of authorized users reaches the maximum user limit on the whole device Log Messa...

Page 489: ...Parameters description ipaddr IP address ipv6addr IPv6 address macaddr MAC address unitID The unit ID portNum The port number Warning Event description Dynamic IMPB entry conflicts with static IMPB L...

Page 490: ...cription portNum The port number Informational Event description Port shut down due to a packet storm Log Message Port portNum is currently shut down due to a packet storm Parameters description portN...

Page 491: ...ed Log Message Spanning Tree port status changed Instance InstanceID port unitID portNum old_status new_status Parameters description InstanceID Instance ID portNum Port ID old_status Old status new_s...

Page 492: ...tifier of the MEP mdlevel Represents the MD level of the MEP unitID Represents the ID of the device in the stacking system portNum Represents the logical port number of the MEP mepdirection Can be inw...

Page 493: ...LAN identifier of the MEP mdlevel Represents the MD level of the MEP unitID Represents the ID of the device in the stacking system portNum Represents the logical port number of the MEP mepdirection Re...

Page 494: ...ard mepid Represents the MEPID of the MEP Notice Port Event description port linkup Log Message Port port link up nway Parameters description port Represents the logical port number nway Represents th...

Page 495: ...eters Description license model License Model Name string25 Activation Code Informational Event Description The Activation Code is unbound Log Message Unbound Activation Code AC string25 Parameters De...

Page 496: ...n a MAC based Access Control host ages out Binding objects 1 swMacBasedAuthInfoMacIndex 2 swMacBasedAuthInfoPortIndex 3 swMacBasedAuthVID 1 3 6 1 4 1 171 12 35 11 1 0 3 PIM6 pimNeighborLoss A pimNeigh...

Page 497: ...it specified by pimRPMappingChangeNotificationPeriod Binding objects 1 pimGroupMappingPimMode 2 pimGroupMappingPrecedence 1 3 6 1 2 1 157 0 4 pimInterfaceElection A pimInterfaceElection notification s...

Page 498: ...ossing event is detected Binding objects 1 dot3OamEventLogTimestamp 2 dot3OamEventLogOui 3 dot3OamEventLogType 4 dot3OamEventLogLocation 5 dot3OamEventLogEventTotal 1 3 6 1 2 1 158 0 2 Up Download age...

Page 499: ...gmtMacAddr 1 3 6 1 4 1 171 12 11 2 2 1 0 4 swUnitRoleChange The stacking unit role change notification Binding objects 1 swStackRoleType 2 swUnitMgmtId 1 3 6 1 4 1 171 12 1 1 2 2 1 0 5 VRRP vrrpTrapNe...

Page 500: ...3 swVlanLoopRestart The trap is sent when a port loop restarts under LBD VLAN based mode after the interval time Binding objects 1 swLoopDetectPortIndex 2 swVlanLoopDetectVID 1 3 6 1 4 1 171 12 41 10...

Page 501: ...flicted on the ring 1 3 6 1 4 1 171 12 78 4 0 3 MSTP newRoot The newRoot trap indicates that the sending agent has become the new root of the Spanning Tree the trap is sent by a bridge soon after its...

Page 502: ...inkup Binding objects 1 ifIndex 2 if AdminStatus 3 ifOperStatu 1 3 6 1 6 3 1 1 5 4 linkDown A notification is generated when port linkdown Binding objects 1 ifIndex 2 if AdminStatus 3 ifOperStatu 1 3...

Page 503: ...m notification Binding objects 1 swSingleIPMSID 2 swSingleIPMSMacAddr 1 3 6 1 4 1 171 12 8 6 0 18 swSingleIPMSfallingAlarm The commander switch will send this notification when its member generates a...

Page 504: ...swDlmsLicenseExpiresIn30Days When a license of non stackable device is going to expire the notification is sent before 30 days Binding object swDlmsLicenseModelName swDlmsInstallAc This trap is used f...

Page 505: ...Stack DGS 3620 Series Layer 3 Managed Stackable Gigabit Switch Web UI Reference Guide 495 Binding objects 1 swExternalAlarmStackingUnit 2 swExternalAlarmStackingChannel 3 swExternalAlarmStackingMessag...

Reviews: